Enterprise architecture and information assurance : (Record no. 48754)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03117cmm a2200289 a 4500 |
001 - CONTROL NUMBER | |
control field | 46744 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IN-BdCUP |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230426175554.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230426s2023 u eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781439841600 |
040 ## - CATALOGING SOURCE | |
Language of cataloging | eng |
Transcribing agency | IN-BdCUP |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | eng |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 003.000 |
Item number | S368 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Scholz, James A. |
Relator term | Author |
245 #0 - TITLE STATEMENT | |
Title | Enterprise architecture and information assurance : |
Remainder of title | developing a secure foundation / |
Statement of responsibility, etc. | James A. Scholz |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boca Raton : |
Name of publisher, distributor, etc. | Auerbach Publications, |
Date of publication, distribution, etc. | 2014 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | chapter 1. Setting the foundation -- chapter 2. Building the enterprise infrastructure -- chapter 3. Infrastructure security model components -- chapter 4. Systems security categorization -- chapter 5. Business impact analysis -- chapter 6. Risk -- chapter 7. Secure configuration management -- chapter 8. Contingency planning -- chapter 9. Cloud computing -- chapter 10. Continuous monitoring -- chapter 11. Physical security -- chapter 12. Building security -- chapter 13. Validating the enterprise |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes.Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. The book's comprehensive coverage includes: Infrastructure security model components, Systems security categorization, Business impact analysis, Risk management and mitigation, Security configuration management, Contingency planning, Physical security, The certification and accreditation process, Facilitating the understanding you need to reduce and even mitigate security liabilities, the book provides sample rules of engagement, lists of NIST and FIPS references, and a sample certification statement. Coverage includes network and application vulnerability assessments, intrusion detection, penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Reading this book will give you the reasoning behind why security is foremost. By following the procedures it outlines, you will gain an understanding of your infrastructure and what requires further attention |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | System design |
Topical term or geographic name entry element | Management information systems |
Topical term or geographic name entry element | Data Protection |
Topical term or geographic name entry element | Database security |
Topical term or geographic name entry element | Information storage and retrieval systems |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Electronic Book Resource |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9781439841600">https://www.taylorfrancis.com/books/9781439841600</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | E-Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Total checkouts | Full call number | Barcode | Date last seen | Uniform resource identifier | Bill Date | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Ranganathan Library | Ranganathan Library | 07/04/2022 | Taylor & Francis | 003.000 S368 | E01348 | 26/04/2023 | https://www.taylorfrancis.com/books/9781439841600 | 07/04/2022 | E-Book |